Find easy ways to identify potential security threats at a glance, top cyber threats and how to stop them in their tracks, ways to put the world’s crippling shortage of cybersecurity professional to work for you, tips for ensuring your personal cybersecurity is up to snuff, special considerations to keep in mind when keeping your smart devices secure, and more in this three-book bundle on cybersecurity.

5 out of 5 stars

marvelous guide

By
semba
on
12-18-18

Cybersecurity Program Development for Business

The Essential Planning Guide

By:
Chris Moschovitis

Narrated by:
Sean Pratt

Length: 9 hrs and 9 mins

Unabridged

Overall

4.5 out of 5 stars
34

Performance

5 out of 5 stars
33

Story

5 out of 5 stars
33

This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.

5 out of 5 stars

Best Reference for Cyber Program Development

By
Roger Swanson
on
07-19-18

Cybersecurity Essentials

By:
Charles J. Brooks,
Christopher Grow,
Philip Craig,
and others

Narrated by:
Ryan Burke

Length: 17 hrs and 27 mins

Unabridged

Overall

5 out of 5 stars
2

Performance

5 out of 5 stars
2

Story

5 out of 5 stars
2

Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm.

The Perfect Weapon

War, Sabotage, and Fear in the Cyber Age

By:
David E. Sanger

Narrated by:
Robertson Dean

Length: 12 hrs and 1 min

Unabridged

Overall

4.5 out of 5 stars
625

Performance

4.5 out of 5 stars
570

Story

4.5 out of 5 stars
564

In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Within that same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff but had placed implants in American electrical and nuclear plants that could give them the power to switch off vast swaths of the country.

5 out of 5 stars

BY FAR the best book to date on this topic!

By
aaron
on
07-09-18

Think Like a Hacker

A Sysadmin's Guide to Cybersecurity

By:
Michael J. Melone

Narrated by:
Mike Wood

Length: 2 hrs and 59 mins

Unabridged

Overall

4 out of 5 stars
18

Performance

4 out of 5 stars
16

Story

4 out of 5 stars
16

Targeted attack and determined human adversaries (DHA) have changed the information security game forever. Writing secure code is as important as ever; however, this satisfies only one piece of the puzzle. Effective defense against targeted attack requires IT professionals to understand how attackers use - and abuse - enterprise design to their advantage. To defend against hackers, you must first learn to think like a hacker.

5 out of 5 stars

Short and to the point

By
Alejandro Hernandez
on
08-07-18

The Art of Invisibility

The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

By:
Kevin Mitnick

Narrated by:
Ray Porter

Length: 9 hrs and 17 mins

Unabridged

Overall

4.5 out of 5 stars
2,976

Performance

4.5 out of 5 stars
2,681

Story

4.5 out of 5 stars
2,683

Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".

Find easy ways to identify potential security threats at a glance, top cyber threats and how to stop them in their tracks, ways to put the world’s crippling shortage of cybersecurity professional to work for you, tips for ensuring your personal cybersecurity is up to snuff, special considerations to keep in mind when keeping your smart devices secure, and more in this three-book bundle on cybersecurity.

5 out of 5 stars

marvelous guide

By
semba
on
12-18-18

Cybersecurity Program Development for Business

The Essential Planning Guide

By:
Chris Moschovitis

Narrated by:
Sean Pratt

Length: 9 hrs and 9 mins

Unabridged

Overall

4.5 out of 5 stars
34

Performance

5 out of 5 stars
33

Story

5 out of 5 stars
33

This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.

5 out of 5 stars

Best Reference for Cyber Program Development

By
Roger Swanson
on
07-19-18

Cybersecurity Essentials

By:
Charles J. Brooks,
Christopher Grow,
Philip Craig,
and others

Narrated by:
Ryan Burke

Length: 17 hrs and 27 mins

Unabridged

Overall

5 out of 5 stars
2

Performance

5 out of 5 stars
2

Story

5 out of 5 stars
2

Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm.

The Perfect Weapon

War, Sabotage, and Fear in the Cyber Age

By:
David E. Sanger

Narrated by:
Robertson Dean

Length: 12 hrs and 1 min

Unabridged

Overall

4.5 out of 5 stars
625

Performance

4.5 out of 5 stars
570

Story

4.5 out of 5 stars
564

In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Within that same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff but had placed implants in American electrical and nuclear plants that could give them the power to switch off vast swaths of the country.

5 out of 5 stars

BY FAR the best book to date on this topic!

By
aaron
on
07-09-18

Think Like a Hacker

A Sysadmin's Guide to Cybersecurity

By:
Michael J. Melone

Narrated by:
Mike Wood

Length: 2 hrs and 59 mins

Unabridged

Overall

4 out of 5 stars
18

Performance

4 out of 5 stars
16

Story

4 out of 5 stars
16

Targeted attack and determined human adversaries (DHA) have changed the information security game forever. Writing secure code is as important as ever; however, this satisfies only one piece of the puzzle. Effective defense against targeted attack requires IT professionals to understand how attackers use - and abuse - enterprise design to their advantage. To defend against hackers, you must first learn to think like a hacker.

5 out of 5 stars

Short and to the point

By
Alejandro Hernandez
on
08-07-18

The Art of Invisibility

The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

By:
Kevin Mitnick

Narrated by:
Ray Porter

Length: 9 hrs and 17 mins

Unabridged

Overall

4.5 out of 5 stars
2,976

Performance

4.5 out of 5 stars
2,681

Story

4.5 out of 5 stars
2,683

Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".

2 out of 5 stars

Limited value for the average person

By
James C
on
10-14-17

Publisher's Summary

Cybercrime is a massive 21st-century problem and small businesses face a huge hurdle to effectively protect themselves and their customers, compared to larger firms. Budgets are tight and not fully understanding the risks means that gaps can easily be left. This practical guide acts like a pocket cyber-security consultant, helping you build a layered cyber-security strategy using a mixture of free and paid-for services. Just because you are a small business, it doesn’t mean you need to be a victim of cybercrime.